{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.22602","arxiv_id":"2604.22602","integrity":{"available":true,"endpoint":"/pith/2604.22602/integrity.json","summary":{"critical":2,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":2,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T10:36:45.281549Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T23:47:48.211373Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5220/0010226102760287' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5220/0010226102760287","detected_arxiv_id":null,"ref_index":9,"audited_at":"2026-05-19T23:47:48.211373Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3642534' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3642534","detected_arxiv_id":null,"ref_index":41,"audited_at":"2026-05-19T23:47:48.211373Z"}],"snapshot_sha256":"02413dceaca70b2cef855d7297c2335cfe35c79d493b8e4160c1765c78684b9a"},"events":[{"event_id":3690,"event_type":"pith.integrity.v1","payload_sha256":"d91856b063caffdb8a21ea66cf3990670d7a4e9e3ad372528900620f57eff033","signature_b64":"HVTlkdMl9p2rFUA3FxzwIE7yxl4C0OQfdkhh36aYdS/N4bvH2rqvMtqGnCkVfXYZfCDEZ3mfj9pl8H39fLIZBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T23:52:28.059606+00:00","payload":{"note":"Identifier '10.1145/3642534' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Yu, Y., Chang, M., Reijers, W., McAuley, D.: How cryptocurrency users choose and secure their wallets. Proceedings of the ACM on Human-Computer Interaction 8(CSCW2), 1–27 (2024).https://doi.org/10.1145/3642534,https://dl.acm.o rg/doi/10.114","arxiv_id":"2604.22602","detector":"doi_compliance","evidence":{"doi":"10.1145/3642534","arxiv_id":null,"ref_index":41,"raw_excerpt":"Yu, Y., Chang, M., Reijers, W., McAuley, D.: How cryptocurrency users choose and secure their wallets. Proceedings of the ACM on Human-Computer Interaction 8(CSCW2), 1–27 (2024).https://doi.org/10.1145/3642534,https://dl.acm.o rg/doi/10.1145/3642534","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":41,"audited_at":"2026-05-19T23:47:48.211373Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3642534","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"68c36eb779e585759124194f32f7e6b636f7e7f37a194addb8bfa64982676ccc","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3689,"event_type":"pith.integrity.v1","payload_sha256":"2cf97800ffa0a92ea1c78ee1fe1c60717f6aef5230ca9659e9b5d16dd1c50b48","signature_b64":"jaBq0QUjYvqStyFlYT7h2fXsxLebXBMJ8gULDJI9YbPsO+1c0tjuFEeEGoGiF3t8Pn2nbZYDrscPqFA868YeCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T23:52:28.053364+00:00","payload":{"note":"Identifier '10.5220/0010226102760287' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Brunner, D., Karame, G.O., Li, W., Tschorsch, F.: Who stores the private key? an exploratory study about user preferences of key management for blockchain-based applications. In: Proceedings of the 7th International Conference on Informatio","arxiv_id":"2604.22602","detector":"doi_compliance","evidence":{"doi":"10.5220/0010226102760287","arxiv_id":null,"ref_index":9,"raw_excerpt":"Brunner, D., Karame, G.O., Li, W., Tschorsch, F.: Who stores the private key? an exploratory study about user preferences of key management for blockchain-based applications. In: Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP). pp. 276–287. SciTePress (2021).https: //doi.org/10.5220/0010226102760287,https://publications.ait.ac.at/en/ publication","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":9,"audited_at":"2026-05-19T23:47:48.211373Z","event_type":"pith.integrity.v1","detected_doi":"10.5220/0010226102760287","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"c1286ac5bbc7bbe61796bdf8b47da655a169358a58fa36ab275107d22b2644ba","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.22602/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}